Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

BankBot YNRK is stealing crypto and bank data in total silence

The trojan achieves long-term persistence by using Android's JobScheduler and obtaining Device Administrator privileges to survive reboots.

byEmre Çıtak
November 28, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

A new and highly sophisticated strain of Android malware, identified as “BankBot YNRK,” has been uncovered by cybersecurity researchers at Cyfirma. This variant distinguishes itself from typical mobile trojans through its ability to perform advanced device profiling and automated interaction, effectively turning compromised phones into silent tools for financial theft. The malware is currently distributed through malicious applications that mimic legitimate utility tools, including fake digital ID scanners and a counterfeit version of Google News that loads the actual news.google.com website to allay user suspicion.

Once installed, BankBot YNRK initiates a “silent phase” designed to evade detection and secure long-term persistence. It immediately mutes the device’s audio streams—notification, ringtone, and media volumes are set to zero—ensuring that the victim remains unaware of incoming alerts related to unauthorized transactions.

Simultaneously, it profiles the host environment, checking for emulator indicators (such as specific battery levels or build fingerprints) to determine if it is being analyzed by security researchers. If the device passes this check, the malware abuses Android’s Accessibility Services, a feature intended to assist users with disabilities, to grant itself administrative privileges. This critical step allows the bot to read screen content, navigate menus, and simulate touch inputs without any physical interaction from the victim.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The malware’s primary objective is the theft of banking credentials and cryptocurrency assets. It communicates with a command-and-control (C2) server to fetch a target list of 62 financial applications, specifically focusing on major banking institutions in Vietnam, Malaysia, Indonesia, and India, as well as global cryptocurrency wallets like MetaMask and Exodus. Unique to this variant is its ability to scrape User Interface (UI) metadata—such as text, button positions, and view IDs—to reconstruct a “skeleton” of the targeted banking app.

This allows the attackers to automate complex login and transfer sequences in the background while the victim’s screen appears inactive. By establishing itself as a Device Administrator and scheduling recurring background jobs, BankBot YNRK ensures it automatically relaunches even after a system reboot, making removal exceptionally difficult for the average user.


Featured image credit

Tags: BankBot YNRKCyfirma

Related Posts

Telegram adds passkey support for Face ID logins

Telegram adds passkey support for Face ID logins

December 16, 2025
LG attacks Samsung with new Micro RGB evo lineup

LG attacks Samsung with new Micro RGB evo lineup

December 16, 2025
Google ends dark web monitoring due to poor feedback

Google ends dark web monitoring due to poor feedback

December 16, 2025
SoundCloud data breach exposes millions of emails

SoundCloud data breach exposes millions of emails

December 16, 2025
First certified third party Pixel Watch 4 charger is here

First certified third party Pixel Watch 4 charger is here

December 16, 2025
You can now store Bitcoin in your MetaMask wallet

You can now store Bitcoin in your MetaMask wallet

December 16, 2025

LATEST NEWS

Telegram adds passkey support for Face ID logins

LG attacks Samsung with new Micro RGB evo lineup

Google ends dark web monitoring due to poor feedback

SoundCloud data breach exposes millions of emails

First certified third party Pixel Watch 4 charger is here

You can now store Bitcoin in your MetaMask wallet

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.